Directed-Graph Decryption
- Directed-graph decryption is a cryptographic methodology that applies trellis decoders to noise-enhanced high-memory convolutional codes for secure and efficient ciphertext recovery.
- It leverages deliberate polynomial ambiguity and masking techniques to create exponential barriers against algebraic and information-set decoding attacks.
- The approach offers post-quantum security with scalable hardware/software implementations, achieving constant per-bit processing and high throughput.
Directed-graph decryption is a cryptographic methodology that utilizes directed-graph-based algorithms, specifically trellis decoders, to efficiently and securely decrypt ciphertexts encoded with noise-enhanced high-memory convolutional codes. This approach is structurally distinct from traditional code-based cryptosystems, presenting both algebraic and complexity-theoretic challenges to adversaries, particularly in the context of post-quantum cryptography. Directed-graph decryption leverages polynomial ambiguity, introduced via encoded masking and deliberate polynomial-division noise, to create substantial barriers for algebraic and information-set decoding (ISD) attacks, while still allowing authorized recipients polynomial-time decryption with constant per-bit computational cost (Ariel, 2 Dec 2025).
1. Algebraic Construction: High-Memory Convolutional Codes
Directed-graph decryption schemes operate by encoding a message polynomial (degree ) using a convolutional code generator matrix with enhanced memory. This generator comprises a base matrix of memory and a set of high-memory polynomials with degrees up to , combined element-wise to yield
A masking matrix of rank is added for polynomial ambiguity. The dense public generator is constructed by scrambling and permuting via invertible matrices and . The public encoder is given by
where is a random error polynomial of specified Hamming weight. The private key contains and a CRC-polynomial for failure detection (Ariel, 2 Dec 2025).
2. Trellis Modeling and Polynomial Ambiguity
The decryption process models the convolutional code using a trellis :
- Nodes: , with for but for the honest decoder.
- Edges: Each state at time branches to for both , labeled by .
The presence of (mask) and the indeterminate polynomial-division remainders generates up to valid “demasked” polynomial candidates for each ciphertext. The trellis is extended with “ambiguity edges” at the start, accommodating all possible linear combinations from the rowspace of . After ambiguity is resolved, decoding proceeds as a standard convolutional trellis over memory stages (Ariel, 2 Dec 2025).
3. Directed-Graph Decryption Algorithm and Complexity
Decryption is realized through the following stages:
- Invert permutation: Apply to the ciphertext.
- Mask ambiguity: For each candidate in the -sized linear span of , generate a demasked vector.
- Polynomial division: For each demasked candidate, divide component streams by their corresponding , discard remainders, and reinterleave.
- Parallel trellis decoding: Launch parallel Viterbi decoders, each working on a memory trellis of length .
- Verification: Use a CRC check to identify the valid plaintext, back-transform by if successful.
The honest decryption complexity is , which is since are small constants (e.g., ), and the cost per bit is constant. Adversarial decryption, lacking and the scramble/permutation matrices, requires an exponential search ( for K-dimensional codes) or algebraic attacks of equivalent cost. These operations are exponential in (Ariel, 2 Dec 2025).
4. Cryptanalytic Security and Comparison with Classic McEliece
Directed-graph decryption with noise-enhanced memory convolutional codes (labeled "MCC" for Masked Convolutional Codes, Editor’s term) achieves a substantial security improvement over Classic McEliece. For code parameters , , effective error weight , the ISD complexity is
compared to for a Goppa code in Classic McEliece. This yields a margin exceeding operations. Under Grover quantum speedup, margins remain greater than . Thus, the system offers security exceeding against both classical and quantum ISD attacks (Ariel, 2 Dec 2025).
| Scheme | Key Parameters | Best ISD Complexity | Security Margin (vs Classic) |
|---|---|---|---|
| Classic McEliece | Baseline | ||
| MCC (this scheme) |
5. Scalability, Per-Bit Cost, and Parallelism
The per-bit computational cost for honest decryption is
as and are constant parameters, invariant with message length . This enables decryption complexity to scale linearly in the ciphertext size, with modern hardware (FPGAs, GPUs, SIMD CPUs) able to accommodate the necessary ACS modules (e.g., for ), supporting gigabit-per-second throughput on sizable messages. Arbitrary plaintext lengths are supported without cost increase per bit (Ariel, 2 Dec 2025).
6. Hardware and Software Implementation
Directed-graph decryption benefits from inherent parallelism. Typical hardware architectures integrate:
- A matrix-multiply/unmask block, polynomial-division engine, and -bit demultiplexer to feed a bank of parallel Viterbi cores.
- FPGA implementations use pipelined ACS arrays across stages, sharing on-chip RAM.
- ASIC/SoC realizations involve dedicated polynomial dividers and Viterbi cores connected via broadcast switches.
- On software platforms, each mask candidate is mapped to a thread or vector lane, using bit-packed ACS updates and vector reductions for minimum Hamming weight computation.
Example performance measures for representative parameters () are:
- FPGA (XC7A200T): 0.8 Gbit/s decryption at 200 MHz clock
- ARM Neon (SW): 200 Mbit/s per core (128-bit SIMD)
This high parallelism and constant per-bit cost allow the scheme to provide both strong post-quantum security and practical throughput in contemporary hardware and software environments (Ariel, 2 Dec 2025).